Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service

Published

27-12-2023

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.51

Keywords:

Trusted third party, Physical unclonable function, Wireless sensor network, Internet of Things, Cluster node, Device fingerprint, X-OR operation.

Dimensions Badge

Issue

Section

SECTION C: ARTIFICIAL INTELLIGENCE, ENGINEERING, TECHNOLOGY

Authors

  • K. Akila Department of Computer Applications, Cauvery College for Women (Autonomous), Affiliated to Bharathidasan University, Trichy, India

Abstract

In the modern digital world, the Internet of Things (IoT) is a modern and advanced technology that interconnects many immeasurable devices. The collection of wireless sensors formed the wireless sensor network. WSN nodes are battery-powered nodes with limited power and computational capability. When using loT-based wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secure protocols. In this technological era where time factor plays a key role in everyone’s personal busy life. The need for smart and sensor appliances that work without human intervention can be a solution to some extent for the time factor. IoT is a network where physical objects, vehicles, devices, buildings and many other smart devices are electronically embedded with hardware and software with huge network connectivity. But the communication and data exchange are not that much easy to carry out, it requires a high secured protocol for authentication as well as key encryptions. Besides focusing on secured key distribution importance for enhancing various parameters are also considered which includes, EC additions, multiplications, pairing, hash-to-point operations, security performances, and energy consumption are also considered. In this paper, focuses on “LSTTP” which authenticates the nodes based on the Device Finger Print (DFP) with a Trusted Third Party and proposes the algorithm for enhancing the quality of service parameters such as Throughput, Jitter, Latency and Security.

How to Cite

Akila, K. (2023). Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service. The Scientific Temper, 14(04), 1404–1411. https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.51

Downloads

Download data is not yet available.